Moving Beyond Deterrence: The Effectiveness of Raising the

450573
an and ChenowethAmerican Sociological Review
2012
ASRXXX10.1177/0003122412450573Dug
Moving Beyond
Deterrence: The Effectiveness
of Raising the Expected Utility
of Abstaining from Terrorism in
Israel
American Sociological Review
77(4) 597­–624
© American Sociological
Association 2012
DOI: 10.1177/0003122412450573
http://asr.sagepub.com
Laura Dugana and Erica Chenowethb
Abstract
Rational choice approaches to reducing terrorist violence would suggest raising the costs of
terrorism through punishment, thereby reducing the overall expected utility of terrorism. In
this article, we argue that states should also consider raising the expected utility of abstaining
from terrorism through rewards. We test effects of repressive (or punishing) and conciliatory
(or rewarding) actions on terrorist behavior using the newly developed GATE-Israel dataset,
which identifies events by Israeli state actors toward Palestinian targets on a full range of
counterterrorism tactics and policies from 1987 to 2004. Results show that repressive actions
are either unrelated to terror or related to subsequent increases in terror, and conciliatory
actions are generally related to decreases in terror, depending on the tactical period. Findings
also reveal the importance of understanding the role of terrorists’ constituencies for reducing
violence.
Keywords
conciliation, counterterrorism, deterrence, expected utility, Israel, Palestine, rational choice
theory, terrorism
Rational choice approaches have long suggested that reducing unwanted behavior
requires raising the costs (or perceived costs)
of a behavior through the threat of punishment—a process commonly referred to as
deterrence. In the eighteenth century, Beccaria ([1764] 1983) argued that the state should
punish law-breakers just enough so that the
burdens of punishment outweigh any pleasure
derived from perpetrating the crime—an idea
that directly informs U.S. criminal law, military strategy, and a host of other social policy
domains. Scholars have since applied the
notion of deterrence to a range of areas,
including nuclear doctrine (Brodie 1959), as
well as a broad range of offending behaviors
(Matsueda, Kreager, and Huizinga 2006;
Nagin 1998; Paternoster 1987), including terrorist violence (LaFree, Dugan, and Korte
2009). The clear appeal of deterrence theory
is its parsimony, as well as the fact that punishment can be imposed with relative ease.
a
University of Maryland
University of Denver
b
Corresponding Author:
Laura Dugan, University of Maryland,
Department of Criminology and Criminal Justice,
2220 LeFrak Hall, College Park, MD 20742
E-mail: [email protected]
598
All the theory requires is that punishment be
calibrated in such a way that specific behaviors are no longer appealing.
Despite the popularity of deterrence, two
important problems remain. First, empirically,
unwanted behaviors continue—and indeed
often increase—despite the threat of punishment. Second, theoretically, implications of
rational choice theory are broader than simply
deterring unwanted behavior through punishment. As Becker (1968) demonstrates, actors
choose whether to break the law by comparing
the expected utility of committing a crime with
the expected utility of making a different
choice. Deterrence-based policies are naturally
directed toward lowering the anticipated gains
of illegal behavior by raising its costs, but relatively little attention has been given to raising
the anticipated value of legal behaviors relative to illegal ones.
In this article, we argue that raising the
expected utility of abstaining from an unwanted
behavior may be an effective policy choice in
certain circumstances. To support this argument, we use a newly developed dataset that
documents specific terrorism-relevant actions
by the Israeli government directed toward substate actors in the Palestinian Territories to
assess effects of repressive actions (which
raise the costs of terrorism) and conciliatory
actions (which raise the benefits of abstaining
from terrorism) on terrorist activity during
three decision regimes: the First Intifada, the
Oslo Lull, and the Second Intifada (Brym and
Andersen 2011; Kuperman 2007; Rasler 2000).
We find that during the First Intifada and
the Oslo Lull, small numbers of conciliatory
tactics led to increases in terror; however, as
Israel initiated more conciliatory actions, the
number of terrorist attacks declined. During
the Second Intifada, conciliatory tactics had a
much stronger and linear effect on reducing
Palestinian terrorist attacks. Furthermore,
despite the conventional confidence in deterrence approaches, repressive actions have
never led to decreases in terrorism and have
sometimes led to increases in terrorism. Our
study is the first to show empirically that
whereas solely repressive tactics tend to
backfire, conciliation toward Palestinians can
American Sociological Review 77(4)
yield lower levels of subsequent Palestinian
violence, even when the primary targets are
religiously inspired terrorist groups, emphasizing an important—yet understudied—
dimension of rational choice approaches. In
summary, Israeli policymakers should consider conciliatory tactics as potentially viable
in reducing terrorism and disempowering
extremists within the Palestinian Territories.
Scholars should study more carefully the conditions under which conciliatory policies may
be effective in reducing terrorism.
RATIONal choice
Predictions of Terrorist
Behavior
Any application of rational choice theory
assumes that actors make decisions designed
to optimize their own well-being while minimizing costs (Bentham [1781] 1996). We
argue that terrorist actors, despite the gruesome nature of their crimes, can be considered rational actors (Crenshaw 2001; LaFree
and Ackerman 2009). Kruglanski and colleagues (2009) characterize the reasons for
violent participation as a quest for personal
significance; other scholars highlight the
common terrorist goal of recognition and
fame (Hamm 2004). These views suggest that
terrorists are generally less concerned about
being punished and more concerned about
their role in ensuring the well-being of their
movement and its constituency, so strategies
that successfully deter common criminals
may be ineffective for terrorists (for an example of this difference among airline hijackers,
see Dugan, LaFree, and Piquero 2005).
Therefore, we deliberately adjust the costs
and benefits of perpetrating terrorist attacks
so that they also relate to the larger goals of
the terrorist movement as well as to any personal fame (LaFree and Dugan 2004).
We illustrate this point by examining the
equation for the expected utility of perpetrating a terror attack (Equation 1). Here, the
expected utility for person i, [E(uterror)i], is a
function of the perceived costs of and benefits
from perpetrating the act:
Dugan and Chenoweth
599
E(uterror)i = pi U( yi – Fi) + (1 – pi) U( yi), (1)
where p is the perceived probability of being
punished, y is the anticipated benefits of perpetrating the act, and F is the perceived penalty for the act.1 Thus, the decision to
perpetrate an act of terror for person i depends
on whether E(uterror)i > E(unonterror)i. The value
of this expectation varies across individuals
depending on their unique preferences, propensities toward violence, and other individual differences (see Tibbetts and Gibson
2002). For terrorists, y typically advances the
movement’s progress toward its larger goals
and improves their personal status, so any
penalty directed toward individual i has less
of an impact on the overall expected utility.
This disproportion between y and F is well
illustrated when we consider suicide attacks.
Even when F is death, the expected utility is
clearly higher for some individuals than are
any alternative actions (see Hafez 2006). It
naturally follows that to deter terrorism, F
must affect more than just the individual.
For this reason, and because policy is
designed to influence the population as an
aggregate—not just specific individuals—we
generalize Equation 1 by averaging across all
individuals to produce Equation 2:
E(uterror) = p U( y – F) + (1 – p) U( y)
(2)
This naturally leads to a policy strategy
designed to reduce the overall expected utility
of terror by increasing the certainty (p) and
severity (F ) of punishment. Rational choice
theory predicts that when states are able to
raise the cost of perpetrating terror high
enough so that the overall expected utility of
terror is lower than that for abstaining from
terror, rates of terrorism will drop.
Raising the Costs of Perpetrating
Terror
Many studies have evaluated the effectiveness of raising the costs of illicit behavior,
such as drunk driving and sexual assault
(Nagin 1998; Nagin and Paternoster 1993;
Paternoster 1987). Research consistently
finds that fewer people report intentions to
engage in illicit behaviors when they perceive
a high risk of detection (Nagin 1998), illuminating the importance of the perceived certainty of being punished (or pi from Equation
1). Evidence supporting the importance of
severity (or Fi from Equation 1) is mixed
(Nagin 1998; Paternoster 1987). Nagin (1998)
cautions, however, that empirical support for
deterrence based only on individual-level
perception studies is insufficient to conclude
that policies can deter crime—other than perhaps policies designed to alter perceptions.
Instead, because policies are designed to
change the behavior of aggregate groups of
people, informative research should also be
conducted at the aggregate.
Aggregate studies of deterrence often take
the form of interrupted time-series analyses
that estimate the impact of a specific intervention on crime, or ecological studies that assess
the natural variation between sanction levels
and crime rates (Nagin 1998). The appeal of
interrupted time-series analysis is that it allows
researchers to evaluate the effectiveness of
specific types of interventions or policies,
such as stricter laws or police crackdowns, on
the particular behaviors these policies are trying to affect (Goldkamp and Vilcica 2008;
Ross 1982; Sherman 1990). Efforts to reduce
terrorist behavior include terrorist apprehension and extended prison sentencing (Landes
1978), passage of anti-terrorism laws (Enders
and Sandler 1993), assassination (Byman
2006; Hafez and Hatfield 2006; Jaeger and
Paserman 2008; Maoz 2007; Plaw 2008;
Zussman and Zussman 2006), curfews and
containment strategies (LaFree et al. 2009;
Maoz 2007), deportation (Maoz 2007), home
demolitions (Benmelech, Berrebi, and Klor
2010), violent repression and military retaliation (Brophy-Baermann and Conybeare 1994;
Brym and Araj 2006; Enders and Sandler
1993; LaFree et al. 2009; Maoz 2007; Testas
2004), and indiscriminate repression (Lyall
2009). Some scholars have also examined
effects of containment policies, such as installation of metal detectors (Cauley and Im 1988;
Dugan et al. 2005; Enders and Sandler 1993;
Landes 1978).
600
The second category of aggregate research
includes ecological studies that examine the
natural variation between intervention levels
and illegal behavior to more clearly identify a
causal link (Nagin 1998). This methodology
measures interventions continuously rather
than by a single shift in a discrete value before
and after its implementation. Continuous
measures are far superior because they portray
a more accurate measure of authorities’ level
of effort, such as increases in the prison population or the number of police on the street
(Levitt 1996, 1997). Ecological studies must
be methodologically sophisticated in order to
identify any causal relationship between sanctions and crime and avoid issues of reverse
causality (e.g., more police are hired in
response to increases in crime [Nagin 1998]).
Although studies have examined effects of
repression on protest (Della Porta 1995; Khawaja 1994; Koopmans 1993; Lichbach 1987;
Moore 1998) and effects of annual human
rights violations on subsequent terrorist attacks
(Piazza and Walsh 2009), no studies to date
have examined both repressive and conciliatory tactics and their effects on terrorism.2
Until now, the only information available on
state actions describes discrete interventions.
These data are usually gleaned from case studies or well-publicized media reports (e.g., the
killing of Osama Bin Laden), yielding data that
are ideal for models of interrupted time series
but not for ecological studies.
Ours is thus the first published ecological
study, of which we are aware, that estimates
the effects of aggregate measures of state
repression and conciliation on terrorism.
Before we continue, we consider two important components of deterrence: the nature of
the targets and the possibility of backlash.
Targets of deterrence (or repression).
Deterrence is indiscriminate when it targets
individuals who have not yet broken the law
(general deterrence) and discriminate when it
targets known offenders (specific deterrence)
(Andenaes 1971; Gibbs 1975). For example,
the British government behaved discriminately when it treated jailed, suspected Irish
American Sociological Review 77(4)
Republican Army (IRA) terrorists as criminals rather than political prisoners (LaFree et
al. 2009). In contrast, Britain behaved indiscriminately when it imposed a 36-hour
military curfew in Northern Ireland and
searched all homes for evidence of IRA membership and weaponry (LaFree et al. 2009).
We expect discriminate and indiscriminate
repression to have different effects on the
expected utility of terrorism (E[uterror] in
Equation 2) because indiscriminate repression affects the larger constituency, on whose
interests terrorists generally base their goals.
In other words, indiscriminate repression
likely raises the costs of terrorism much
higher than any penalty directed toward a
specific offender. For instance, Lyall (2009)
finds that indiscriminate violent repression
reduced the number of insurgent attacks in
Chechnya over a three-month period by about
24 percent.
Possible backlash. Despite the popularity of deterrence theories, research shows that
punishment sometimes fails to deter and can
even lead to more crime. For example, label
theorists argue that when states impose punishment, offenders will begin to identify more
thoroughly with their role as law-breakers and
will then fortify their criminal (or terrorist)
lifestyles (Becker 1963; Farrington 1977;
Schwartz and Skolnick 1962). Other scholars
claim that when punishment compromises the
perceived legitimacy of the punisher, it could
elicit acts of defiance (Sherman 1993; Tyler
2006). Indiscriminate repression, often
viewed as illegitimate, may lead to defiance
and increased violence. For instance, although
Benmelech and colleagues (2010) find that
home demolitions that targeted suicide terrorists’ families reduced subsequent Palestinian
suicide attacks during the Second Intifada,
incidental or preventive home demolitions
resulted in a sharp increase in suicide terrorist
attacks.
Other research also finds that state repression exacerbates terrorism, or at least mobilization in general. Peroff and Hewitt’s (1980)
analysis of Northern Ireland indicates that
Dugan and Chenoweth
between 1968 and 1973, an increased British
troop presence led to more rioting, a finding
that White (1989) corroborates. Similarly,
LaFree and colleagues (2009) find that three
of six British interventions in Northern Ireland led to increases in the risk of Republican
terrorist attacks. Khawaja (1993) finds that
repressive acts by Israel increased the rate of
collective action by Palestinians in the West
Bank. In her study on protest events during
the Iranian Revolution, Rasler (1996) finds
that repression decreased protests in the short
run but increased them in the long run. Testas
(2004) concludes that political repression
may be negatively associated with levels of
terrorism over the short term, but that continued use of repressive policies will eventually
increase terrorist activity. Piazza and Walsh
(2009) corroborate these findings on a global
scale, finding that countries that violate
human rights are more likely to suffer terrorism than are countries that adhere to human
rights—particularly rights that affect physical
safety. Furthermore, Brym and Araj (2006)
and Araj (2008) argue that terrorism emerges
as a response to perceived injustices, such as
government repression, that inspire groups to
mobilize in retaliation.
Another less evident form of backlash
results when offenders substitute one prohibited activity for other illegal acts. For example, despite finding that metal detectors led to
a reduction in airline hijacking, Enders and
Sandler (1993) note a subsequent increase in
hostage taking events. Displacement thus
occurs when the expected utility of committing one type of offense (e.g., hijacking)
drops below the expected utility of a different
offense (e.g., hostage taking) (see Cornish
and Clarke 1987).
One could conclude that policies must be
designed to lower the expected utility of all
reasonable offenses. But this would be prohibitively costly for any state. Instead, we
argue that by focusing efforts only on reducing the expected utility of perpetrating an act
(i.e., E[uterror]), we ignore a potentially important component of the rational choice decision: the utility of abstaining from crime (i.e.,
601
E[unonterror]). Therefore, we next consider how
raising the benefits of abstaining from terror
might reduce subsequent incentives to engage
in terrorism.
Raising the Benefits of Abstaining
from Terror
Equation 3 presents the expected utility of
nonterror, which parallels that for the expected
utility of terror in Equation 2:
E(unonterror) = q U(x + G) + (1 – q) U(x)
(3)
Here, q represents the probability of receiving rewards for abstaining from terrorism, x
represents the value of the current situation
(i.e., the status quo), and G represents the
anticipated rewards of abstaining from terrorism. Aside from the different meanings
attributed to each component of the equation,
the primary difference between Equations 3
and 2 is that G (anticipated rewards) adds to
the value of x in Equation 3, whereas F
(anticipated punishment) detracts from the
value of y in Equation 2. This small contrast
establishes that this is a carrot, rather than a
stick, approach to countering terrorism (Frey
2004).
We can better appreciate the role of U(x +
G) when we take a closer look at x. By representing the status quo, x directly relates to the
grievances that motivate people to commit
acts of terror. For example, if we consider the
case of ETA (Euskadi Ta Askatasuna), the
nationalist terror organization in the Basque
region of Spain, the status quo (x) is that the
Basque region remains under the sovereignty
of Spain, despite ETA’s intent to establish an
independent reunified Basque state (Clark
1990; Mees 2003). If the Spanish government
offered rewards (G) to ETA or its Basque
constituency (e.g., allowing the Basque people greater freedoms to practice their cultural
traditions), then the utility to ETA and the
Basque people, if Spain were to follow
through on these rewards, would be U(x + G)
(note that q is the probability that Spain actually does follow through on these rewards). In
602
other words, for ETA and the Basque people,
the utility would be a function of the advantages of the rewards in addition to the status
quo (i.e., more freedoms while still under
Spain’s sovereignty). Although these rewards
might not offset their grievances, they would
indeed improve upon the status quo. If the
incentive to behave according to the law is
only the status quo (despite the absence of
punishment that deterrence promises), it may
not prevent rational actors from executing
their illegal prerogatives. Quite simply, by
raising the overall E(unonterror) to be greater
than the E(uterror), a country may be more
likely to experience a drop in terrorism.3
With a few exceptions (Bueno de Mesquita 2005; Kydd and Walter 2002; Lapan
and Sandler1988; Neumann 2007), little
research explicitly assesses effects of conciliation on crime or terrorism. Our interest is not
limited to bargaining with terrorists, but also
includes rewarding nonterrorist behavior. For
example, many programs (e.g., after-school
programs) provide legal alternatives to crime,
which inherently raise the expected utility of
leading crime-free lives (Gottfredson et al.
2004; Newman et al. 2000). Governments
have also attempted to provide alternatives to
terrorist violence. Small movements in this
direction include the establishment of the
Basque Autonomous Community in the postFranco Spanish constitution, which improved
the status quo for the Basque people (Clark
1990). The Turkish army attempted to
improve the status quo for Turkish Kurds in
the mid-1990s by opening educational and
health facilities to the Kurdish population in
the southeast (Cornell 2001). Such actions
raise the expected utility of not engaging in
terrorism, and in these contexts they can be
considered conciliatory rather than repressive. Although these actions fall short of
compensating for the original grievances,
they do reward nonviolent behavior and may
encourage people to refrain from terrorism.
Notice that these efforts target individuals
who have engaged in illegal behaviors as well
as those who were only at risk of such behavior. Just as repressive actions can affect both
American Sociological Review 77(4)
the innocent (general) and known offenders
(specific), conciliatory actions can also target
indiscriminately and discriminately.
Targets of rewards (or conciliation).
Neumann (2007) and others suggest that governments can win the legitimacy battle in part by
approaching terrorists’ constituents with a more
conciliatory tone and set of actions (i.e., indiscriminate conciliation). Through improved
legitimacy, governments offer fair treatment (G
in Equation 3) that could be lost after a terrorist
attack. Yet patience and consistency are required
for conciliatory actions to influence terrorist
behavior, because these actions rely on trust that
can only develop over time.
Many scholars note the importance of
appealing to terrorists’ constituencies. The
Armenian terrorist group ASALA reduced
attacks quickly after losing the support of its
primary constituency, the Armenian diaspora
(Dugan et al. 2008). Terrorist organizations
rely on their constituencies for financial support and as an ongoing recruitment pool.
Indeed, Crenshaw (2001) explains that the key
component for group survival is recruiting and
maintaining a strong membership. To preserve
the loyalty of their constituencies, some terrorist organizations provide social services to
accommodate their needs. Poor constituencies
are especially dependent on terrorist organizations when they are the only service provider
(Flanigan 2010). This strategy has paid off for
Hamas, which developed a network of charitable organizations and services for the Palestinian people and then won a majority of the
Palestinian parliamentary seats in January
2006 (Malka 2007). Hezbollah, which is better
equipped to provide services to Southern Lebanon and the southern suburbs of Beirut than is
the Lebanese government (Flanigan and
Abdel-Samad 2009), also won electoral victories. Constituencies’ dependence on terrorist
organizations demonstrates the strategic
importance of governments providing competing social support through overt conciliatory
actions. We expect that when governments are
able to improve the status quo (G) for indiscriminate yet relevant populations, terrorist
Dugan and Chenoweth
organizations will have difficulty maintaining
strong membership and will subsequently lose
the capacity to inflict harm.
Conciliatory actions can also be discriminate when they target known offenders.
Deradicalization programs engage convicted
terrorists in religious dialogue to dismantle
the ideological beliefs that justify terrorism.
Concurrently, these programs work closely
with detainees’ families to prepare them to
lead normal, nonviolent lives by providing
financial support to educate the children,
training wives, and helping to reintegrate
detainees into the community (Kruglanski,
Gelfand, and Gunaratna 2010). Similar conciliatory efforts took place in Europe in the
1980s when Spain pardoned imprisoned ETA
members after they publicly renounced the
organization and its use of violence. This
reinsertion policy allowed ETA members to
live normal lives, free from ETA (Mees 2003).
The Italian government offered leniency to
members of the Red Brigades when they provided information that led to the apprehension of other members (Crenshaw 2001;
Cronin 2006). In all of these examples, governments strategically raised the expected
utility of choosing a violence-free life for
known terrorists. Although some of these
efforts show promise (Kruglanski et al. 2010),
we expect conciliatory efforts that target the
broader constituency will be more effective in
reducing terrorism in the long term, because
they will eventually shift popular opinion
away from terrorism, depleting terrorist
groups of public support.
Tactical Regimes and
the Israeli–Palestinian
Conflict Environment
Much can be said about Israel’s relationship
with its contentious neighbors,4 but our primary goal is to explore Israel’s objective of
reducing Palestinian terrorist attacks. The
modern terrorist environment can be traced to
the Palestine Liberation Organization (PLO),
a secular, nationalist, umbrella organization
603
created in 1964 consisting of four main factions: Fatah, the Democratic Front for the
Liberation of Palestine (DFLP), the Popular
Front for the Liberation of Palestine (PFLP),
and the Palestinian Communist Party (PCP).
A core group of exiled Palestinian Fatah
members, including Yassir Arafat and Khalil
Al-Wazir (Abu Jihad), dominated the PLO.
The group’s leadership looked to other anticolonial movements, such as the Algerian
Liberation Front, for inspiration and adopted
armed struggle as the sole method of confronting the Israeli occupation in the late
1960s (see Article 9 of the Palestinian
National Charter, drafted in 1968) (Kadi
1969). Early examples of armed actions
include multiple airline hijackings, high-profile assassinations, and the famed Munich
Massacre, a high-profile kidnapping and murder of 11 Israeli athletes at the 1972 Munich
Olympic Games by the Palestinian group
Black September. However, due to popular
backlash against the latter incident, Palestinian
groups refocused their efforts on armed struggle against Israel within Israel itself.
We now turn our focus to the three time
periods under inquiry. Scholars typically
describe the First Intifada, the Oslo Lull, and
the Second Intifada as distinct periods in
which the Israeli government adopted fairly
uniform approaches to managing the terror
environment (Brym and Andersen 2011;
Kuperman 2007; Rasler 2000). Previous studies have sought to explain the causes of these
regimes, whereas we are more interested in
the effects of Israeli policies during these
periods. We note that, importantly, different
terrorist groups predominated during each of
the distinct regimes. Moreover, despite adoption of particular regimes, we observe a mix
of conciliatory and repressive tactics during
each of these periods, demonstrating that the
tactical regimes were not as uniform as is
often suggested.
The First Intifada (1987 to 1993)
Although the PLO endorsed and pursued
violent methods of resistance against Israeli
604
occupation, the first Palestinian Intifada that
began in December 1987 was initially a nonviolent popular uprising that erupted in a Gaza
refugee camp and spread throughout the Gaza
Strip and the West Bank (King 2007). The
uprising succumbed to factional divisions and
violence by mid-1990 (Pearlman 2008/2009).
Although secular Palestinian nationalists dominated the campaign and the consequent Oslo
Accords, two offshoots of the Muslim
Brotherhood, Islamic Jihad and the Islamic
Resistance Movement (Hamas), emerged as
important players in the latter part of the First
Intifada. These two religious groups aspired to
create an Islamic Palestine governed by sharia
law and refused to recognize Israel as a legitimate state (Brym and Andersen 2011; Kydd
and Walter 2002). The coexistence of multiple
Palestinian groups undermined the unity of
Palestinian resistance during the First Intifada,
and by spring 1990, Palestinians were killing
more fellow Palestinians than Israeli soldiers
were (Pearlman 2008/2009; Rigby 1991).
Nevertheless, popular opinion in Israel
began to turn against Israeli occupation of the
Palestinian territories, and in October 1991,
Israeli and Palestinian negotiators met for
bilateral talks at the Madrid Conference. After
more than eight months of talks, key issues—
such as the status of the Jewish settlements
inside the Palestinian Territories—remained
unresolved. But in 1993, Israeli and PLO
officials began to meet in secret in Oslo, Norway, paving the way for a series of agreements known as the Oslo Accords.
The Oslo Lull (1993 to 2000)
As part of the Oslo Accords, negotiators established the Palestinian Authority (PA), a semiindependent governing body that assumed
limited control over parts of Gaza and the West
Bank. In return, Arafat and the Palestinian leadership agreed to recognize Israel’s territory
within the 1967 borders. Brym and Andersen
(2011) write that a new decision regime began
to dominate Israel at this point: a regime that
privileged political solutions over military ones
with regard to the Palestinian Territories, and
American Sociological Review 77(4)
that turned the focus to defending against threats
from regional rivals, such as Iran.
Commentators often point out that neither
side has lived up to its Oslo obligations (Marshall 2009). Israeli settlements continued to
expand throughout the 1990s, and the PA
failed to maintain security in the Palestinian
Territories, mismanaged economic affairs,
and engaged in widespread corruption. Palestinian extremist groups—particularly Hamas
and the Palestinian Islamic Jihad (PIJ)—continued to launch sporadic violent attacks
against Israeli civilians after the Oslo Accords
were signed, and Jewish extremists carried
out violence against Palestinian civilians as
well. Yet Israel responded to these incidents
with considerable restraint until the Second
Intifada began (Brym and Andersen 2011).
The Second Intifada (2000 to 2004)5
In September 2000, tensions erupted when
then-Defense Minister Ariel Sharon visited
the Temple Mount. Viewed as an affront to
Islamic faith and a dishonor to Palestinian
traditions, Palestinian extremist groups initiated a sustained violent campaign that became
known as the Second Intifada, also known as
the al-Aqsa Intifada (Beitler 2004). In contrast to the First Intifada, the Second Intifada
was primarily violent.
Religious groups (Hamas and PIJ) carried
out the majority of terrorist attacks during this
period, which became distinctive for the suicide bombing campaigns perpetrated against
Israeli civilians and occupation forces. From
2000 to 2005, suicide bombing was the
favored tactic of Islamist Palestinian groups
such as Hamas and PIJ. Secular groups such
as the Popular Front for the Liberation of
Palestine (PFLP), the Democratic Front for
the Liberation of Palestine (DFLP), and the
Al-Aqsa Martyrs Brigades, a collection of
Fatah-affiliated cells, deployed this tactic as
well (Bloom 2004; Hafez 2006), but not to
the same extent as religious groups.
Israel responded by intensifying occupation
of the West Bank and Gaza Strip, initiating programs such as bulldozing suicide bombers’
Dugan and Chenoweth
homes, increasing curfews, assassinating militant leaders, and constructing a highly controversial concrete and barbed-wire barrier that
weaves between Israeli and Palestinian occupied land. Although Israel’s military occupation
of the West Bank ended in 2005, Hamas won
the 2006 elections to become the legitimate
government of the PA. Hamas has refused to
negotiate with Israel or recognize Israel’s right
to exist, and indeed has continued to support the
use of violence against Israelis. At the same
time, Israeli elected leaders have also become
increasingly hawkish, adopting provocative
policies such as further settlement expansion. In
2009, Israel launched Operation Cast Lead, a
war in the Gaza Strip that resulted in thousands
of deaths. With no resolution in sight, Israel
continues to face attacks from within the Palestinian Territories, and the Israeli government
continues to rely overwhelmingly on force to
attempt to deter yet more violence.
Israel continues to experience violent attacks
by Hamas, PIJ, and Fatah-affiliated organizations—all of whom are sensitive to and dependent on sympathy and support from the Palestinian
population, the vast majority of whom would not
engage in terrorist activities as their default
choice (Bloom 2004; Hafez 2006). As mentioned earlier, most terrorist groups rely on willing recruits to survive (Crenshaw 2001).
Moreover, these groups are much more likely to
endure when the surrounding population is either
complicit in their activities, sympathetic toward
them, or convinced that informing Israelis will
result in swift retaliation from the terrorist groups
themselves (Kalyvas 2006; Kocher and Kalyvas
2007; Lyall and Wilson 2009). As many analysts
have noted, the civilian population is the central
fulcrum of any protracted civil conflict (Kalyvas
2006; Lyall and Wilson 2009), and the Israeli–
Palestinian conflict is no exception.
Applying Rational
Choice to the IsraelI–
Palestinian Conflict
Within the context of Israel, raising the costs of
terror is akin to initiating repressive actions
against the Palestinians; and raising the benefits
605
of abstaining from terrorism is akin to initiating
conciliatory actions by the Israeli government
toward Palestinians. Israeli actions may target
known Palestinian terrorists (discriminate) or
Palestinian civilians in general (indiscriminate).
Hypotheses
As a guide to the hypotheses we present a
final equation that combines Equations 2 and
3 into one inequality. When
E(uterror) < E(unonterror),
(4)
we expect less terrorism. We now present three
hypotheses that follow directly this inequality
condition, and two hypotheses that relate to
specific components of the expected utility of
terror and nonterror.
Hypothesis 1: Any Israeli action leads to fewer
terrorist attacks by Palestinians.
We present this hypothesis because
whether Israel lowers the expected utility of
terrorism through repressive actions or raises
the expected utility of nonterrorism through
conciliatory actions, the result should produce a higher utility for nonterrorism, thus
leading a rational actor away from terrorist
behavior. The next two hypotheses are specific to each type of expected utility.
Hypothesis 2: Conciliatory actions lead to fewer terrorist attacks by Palestinians.
Hypothesis 3: Repressive actions lead to fewer
terrorist attacks by Palestinians.
These hypotheses allow effects of the specific type of action to behave independently
from effects of the other type. Because both
punishment and reward are expected to tilt
inequalities in favor of nonterrorism, we predict that both types of actions will lead to
fewer attacks.
The two secondary hypotheses are generated
from other components of rational choice.
Hypothesis 4: Indiscriminate repressive actions
lead to more terrorist attacks.
606
Here, we expect repressive actions that
affect the Palestinian people in general will
cause a backlash of violence. Prior literature
has found evidence of backlash (Benmelech
et al. 2010), and an important source of backlash is the Israeli government’s compromised
legitimacy. Without legitimacy, Palestinians
have little reason to trust that the Israeli government will behave fairly in times of peace
(Braithwaite 2005).6
This reaction by the larger constituency
can favor Israel if it provides peaceful alternatives to violence. This leads to the next
secondary hypothesis:
Hypothesis 5: Indiscriminate conciliatory actions lead to a larger decrease in terrorist
violence than do other actions.
Quite simply, if Israel builds legitimacy
and trust through conciliatory actions, the
Palestinian people will be more reluctant to
sabotage the possibility of peace by supporting terrorism. Without their support, terrorists
will be unable to maintain an ongoing campaign of violence.
Research Strategy
The study of counterterrorism has long been
constrained by a lack of high-quality data
with which to evaluate these approaches in a
robust way (Chenoweth and Dugan 2011). To
test our hypotheses, we provide several
empirical innovations. First, we focus on relational data between state and Palestinian
actors in Israel. Second, we include a wide
range of state actions under the category of
“counterterrorism.” Many studies focus
exclusively on repression or concessions, but
we collected data on thousands of types of
state actions—from raids and arrests to allowing telephone lines to be built in refugee
camps—so that we can explore the relative
effects of different types of interactions. This
allows us to move away from misleading
characterizations of conflict as a series of
dichotomous choices and to consider a wider
range of conflict actions (Chenoweth and
American Sociological Review 77(4)
Dugan 2011). Third, we use newly collected
event data on the specific actions taken by the
state of Israel directed toward substate actors
relevant to the Israeli conflicts with Palestinian
populations. This allows us to aggregate the
data to any temporal unit. For this research,
we chose to aggregate to the month because
the Israeli–Palestinian conflict is highly
dynamic, and information is outdated after a
few months. Finally, we adopted a method
that allowed us to estimate effects of various
tactics on terrorist attacks while accounting
for reciprocal effects that terrorist attacks may
have on counterterrorism actions.
Data
Data for these analyses come from two
sources. The dependent variable, Palestinian
terrorist attacks, comes from the Global
Terrorism Database (GTD), which was collected by scholars at the Center for the Study
of Terrorism and Response to Terrorism
(START) (LaFree and Dugan 2007). The
independent variables, Israeli state actions,
come from a new database collected by the
authors called Government Actions in a
Terrorist Environment-Israel (GATE-Israel)
(Chenoweth and Dugan 2011). The current
analysis is constrained to the years covered
by this dataset, June 1987 through December
2004. This collection is part of a larger effort
to document tactics used by states to reduce
terrorist threats (Chenoweth and Dugan
2011).7
Palestinian terrorist attacks. The GTD
is an event-based database that documents all
terrorist attacks across the globe from 1970
through 2010.8 The collection was originally
compiled by the Pinkerton Global Intelligence
Services (PGIS) from 1970 through 1997, and
then cleaned and updated by START staff and
contractors (Dugan 2012; LaFree and Dugan
2007). Regardless of the collecting agent, all
cases came from open sources available
through media and other reporting agencies.
The reliance on open sources produces
some strengths and some weaknesses (see
Dugan and Chenoweth
LaFree and Dugan 2007). The most relevant
concern for this research is that open sources
are biased toward the most noteworthy events
and are likely to underrepresent attacks on
more remote parts of the globe. However,
because the Israeli–Palestinian conflict has
been central to the international arena, we are
not very concerned about missing events. Furthermore, because it is inevitable that some
events might have missed public scrutiny, we
have no reason to believe this issue would be
systematic.
Two nuances in GTD data are relevant to
the current analysis. First, all events from the
year 1993 are missing. Boxes that held the
original data for that year were lost while still
under the control of PGIS. All analyses thus
exclude the months of that year. We note that
1993 spans the tactical regimes of the First
Intifada and the Oslo Lull. Second, although
the original data were collected prospectively
by PGIS, data since 1998 were collected retrospectively, inevitably undercounting attacks
that were documented only in sources that are
no longer available. To adjust for this, all
models include an indicator variable that distinguishes the retrospective period from the
prospective period (GTD2 = 1 if year > 1997
and 0 otherwise).9 We expect the coefficient
for this estimate to be negative, absorbing
the undercounting for the retrospective data
collection.
Dependent variables for all analyses come
from the GTD and are counts of Palestinian
terrorist attacks for each month. We used only
GTD cases that involved at least one Israeli
target in Israel or the Palestinian territories.
Furthermore, because the GTD provides
some information about the perpetrator in
nearly 70 percent of these attacks, and because
the majority of attacks are Palestinian related,
we included in the current analysis all attacks
by unknown perpetrators (30.2 percent) and
excluded attacks by non-Palestinians (e.g.,
Lebanese or Israeli terrorists). Although it is
possible that some of the unknown attacks
were by non-Palestinians, we doubt that any
error is systematic. After filtering attacks by
these criteria, we found 1,208 terrorist attacks
607
by Palestinians against Israelis from June
1987 through December 2004, the months
used in the current analysis.
Israeli state actions. The GATE-Israel
Database includes all Israeli actions toward
substate actors from June 1987 through
December 2004. Our focus is on actions
directed toward Palestinian terrorists or civilians. We collected data using Textual Analysis
by Augmented Replacement Instructions
(TABARI), which searches news articles and
identifies observations that match the criteria
of an extensive set of dictionaries designed to
capture international and domestic activity
(Schrodt 2001, 2006).10 TABARI is an automated text-coding program that codes news
articles based on noun and verb pattern recognition. This method is surprisingly accurate
and considerably more efficient than human
coding of entire stories (Schrodt 2001,
2006).11 For other recent applications of
TABARI, see Clauset and colleagues (2010);
Shellman (2008); and Shellman, Hatfield, and
Mills (2010).
In our study, we used TABARI to code
243,448 Reuters articles downloaded from
Factiva using the word “Israel*” as the search
criterion for the period January 1, 1987 to
December 31, 2004. Reuters’ archives begin
in June 1987, delineating the beginning point
of this research. We determined the end date
at the time we wrote the original grant proposal. We chose Reuters over other wire services because of its consistent editorial
control and its tendency to use a simpler
sentence structure and vocabulary than alternative news sources such as the Washington
Post and the New York Times (Schrodt, Davis,
and Weddle 1994; Schrodt and Gerner 1994).
After TABARI identified relevant news
articles, we filtered the output to keep only
actions that the Israeli government implemented toward substate targets. We chose not
to select on the types of actions (or verbs) to
make sure that all unexpected actions would
be captured. This method ensures that we
captured a wide range of actions that may not
immediately seem like counterterrorism but
608
American Sociological Review 77(4)
Table 1. Seven-Point Guide for the Conciliatory–Repression Scale
1 = Accommodation/Full Concessions
Appeasing or surrendering to adversary
Making full concessions to opponent’s demands
Action required
2 = Conciliatory Action
Making material concessions
Taking action that signals intention to cooperate or negotiate with opponent
3 = Conciliatory Statement or Intentions
Expressing intention to cooperate or showing support
Verbal expression short of physical action
4 = Neutral or Ambiguous
No clear moves toward or away from resolution of conflict
Includes all attempts to ask for help from a third party to resolve the conflict
Requires more context to determine whether it is conciliatory or repressive
Includes all infighting over Palestinians within the Israeli government
5 = Verbal Conflict
Express intent to engage in conflict or threaten
Decline to cease ongoing conflict; maintain the status quo during conflict
Short of physical action
6 = Physical Conflict
Physical or violent action aimed at coercing opponent
No apparent intention to kill
7 = Extremely Deadly Repression
Physical action exhibiting intent to kill
Torture or severe violence (such as severe beatings), which could easily kill someone
are relevant to the overall conflict, such as
allowing developers to build better water
wells in the Palestinian territories.
Furthermore, we autocoded each action
according to several additional criteria. Relevant to this study, we established a Conciliatory–Repression scale for each action,
illustrated in Table 1. We based all codes on the
Palestinian perspective. The scale features distinctions in the intensity of the action as well as
its relative placement of the action on a conciliation–repression spectrum, similar to the
Goldstein (1992) scale. Table 2 lists specific
actions found in our data that commonly fell
into each category. We also autocoded each
observation for whether the action’s target was
discriminate or indiscriminate. Discriminate
actions attempt to single out guilty or suspected parties from uninvolved parties. Indiscriminate actions directly affect uninvolved
people (i.e., individuals who are not suspected
of involvement in terrorist activity).
Following the autocoding stage, research
assistants hand-checked each observation to
ensure that TABARI coded each story correctly
and to mark for removal any irrelevant cases.
During this cleaning process, we also attributed
each government action to politicians, the military, the judiciary, or the police. This process
revealed a relatively high degree of error (about
30 percent). Research assistants corrected these
errors, and both authors checked their coding to
ensure intercoder reliability. The resulting file
contains the lead sentence to the article, the
actor, action, target, the new codes mentioned
earlier for 6,070 Israeli government actions, and
other variables not relevant to the current study.
This dataset gives an action-by-action view of
Israeli attempts to resolve conflicts with various
non-state actors, including Palestinian, Israeli,
Dugan and Chenoweth
609
Table 2. Examples of Common Actions for Each Scale Item
Accommodation/Full Concessions
Withdrew from town
Signed peace accord
Handed town to Palestinians
Conciliatory Action
Met to discuss
Released
Lifted curfew
Pulled out
Investigated abuse
Conciliatory Statement or Intensions
Expressed optimism
Agreed to hold talks
Praised Palestinians
Expressed desire to cooperate
Admitted mistake
Neutral or Ambiguous
Infighting over
Failed to reach agreement
Hosted a visit
Appealed for third-party assistance
Investigated
and Lebanese militants. Over 90 percent of
actions were directed toward Palestinians or
Palestinian terrorists (Chenoweth and Dugan
2011). For the current analysis, we retained
only actions relevant to the Israeli–Palestinian
conflict.
Analysis
We combined the GTD and GATE-Israel data
into four monthly time-series datasets. The
first includes most of the 211 months from
June 1987 through December 2004. We omitted all months from 1993 (211 – 12 = 199)
because the GTD data are missing; we
dropped the first four months of the set due to
the lagged dependent variable, which we
describe below (199 – 4 = 195). Furthermore,
because 1993 is missing, we also dropped the
first four months of 1994 from the models
due to the lagged dependent variable (195 – 4
= 191). The second dataset includes only the
Verbal Conflict
Made pessimistic comment
Dismissed
Blamed for attack
Denied Responsibility
Threatened military force
Physical Conflict
Demolished
Barred
Sealed off
Imposed curfew
Arrested
Extreme Deadly Repression
Shot dead
Fired missiles
Clashed with
Raided
Helicopter attack
months during the First Intifada (December
1987 through August 1993), noting that the
eight months in 1993 are missing. The third
dataset includes only the months during the
Oslo Lull (September 1993 through August
2000), with the four months of 1993 and the
first four months of 1994 missing. The final
dataset includes only the months during the
Second Intifada (September 2000 through
December 2004). We conducted all analyses
using the three smaller datasets to assess the
robustness of the findings to the different
tactical regimes.
We used a two-step methodological
approach—one parametric and the other nonparametric—to assess the robustness of the
findings and to provide a visual representation of the relationship between government
actions and terrorist attacks. First, we parametrically tested these relationships by modeling them using a negative binomial
regression (NBR). Because the relationships
610
can be nonlinear (i.e., the effect of government actions on terrorism depends on the
number of actions), we tested for both linear
and nonlinear relations using squared terms.
We used NBR because the dependent variable
is a count of the number of attacks in the current month, which is a relatively rare event.
Furthermore, because there is a chance that
the variance is over-dispersed, we chose the
more flexible negative binomial over the
more restrictive Poisson model (Greene
2008).
The nonparametric approach, Generalized
Additive Models (GAM), allows us to visually examine relationships between government actions and the number of terrorist
attacks during the next month, while controlling for all the same variables that are in the
NBR. Because the dependent variable is a
count, we used a log link function for a Poisson distribution. This methodology uses a
smoothing function to isolate the relationship
between actions and attacks without imposing
assumptions about linearity (Hastie and Tibshirani 1990). The method produces graphs
that show partial predictions of our independent variables with confidence intervals, allowing us to visually examine the nature of the
relationships for consistency with our hypotheses (Xiang 2001). Using both methods to
examine these relationships allowed us, first,
to test the robustness of the findings with and
without parametric assumptions and, second,
to visually examine the nature of the relationship in the absence of statistical significance.
The general format of all NBR and GAM
models follows the form shown in Equation 5,
Attackst = f(Actionst–1, Regimes, GTD2,
(5)
Attackst–1, Attackst–2, Attackst–3, Attackst–4),
where the vector Regimes is included only in the
model for all months and includes an indicator
variable for each Intifada (First and Second).
These are important controls because levels of
terrorist activity and the Israeli decision regime
differed substantially depending on the tactical
regime (Brym and Anderson 2011).12 GTD2
is an indicator variable depicting the years of
American Sociological Review 77(4)
Table 3. Primary Independent Variables
Measuring Israeli Government Actions
Model 1.
All Actions (Hypothesis 1)
Model 2.
Conciliatory and Repressive Actions
(Hypotheses 2 and 3)
Model 3.
Conciliatory-Discriminate, Conciliatory-Indiscriminate, RepressiveDiscriminate, and RepressiveIndiscriminate (Hypotheses 4
and 5)
retrospective data collection (1998 to 2004),
Attacks represents the number of Palestinian
attacks directed toward Israelis for the current
month (t) and the four previous months (t – 1
through t – 4).13 By including measures of
lagged attacks in the models, we are better able
to isolate the effect of actions in the previous
months on attacks in the current month. Without
controlling for lagged attacks, the estimated
relationship between actions and attacks would
likely be distorted because it would include any
effects that earlier attacks had on both government actions and current attacks.
For each dataset, we ran three models,
measuring government actions according to
the several dimensions listed in Table 3. Most
apparent is that models go from least granular
(All Actions) to most granular, where repressive and conciliatory actions are partitioned
by whether they were discriminate or indiscriminate. We ran each set of independent
variables using NBR and GAM for all four
datasets, totaling 12 models.
Results
Because this research presents a new dataset,
we begin our analysis by presenting descriptive statistics for the primary dependent and
independent variables for all months specified to the tactical regime (see Table 4). For
each regime, we present the means, standard
deviations, and proportion of months that
have a value of zero. We included only the
months that are in the analyses, so we lagged
all actions by one month, excluded the first
Dugan and Chenoweth
611
Table 4. Means, Standard Deviation, and Proportion of Zeros
All Months (n = 191)
First Intifada (n = 61)
Variable
Mean
SD
P(0)
Mean
SD
P(0)
Attacks
All Actions
Conciliatory
Repressive
Conciliatory-Discriminate
Conciliatory-Indiscriminate
Repressive-Discriminate
Repressive-Indiscriminate
5.84
27.90
7.55
17.95
1.47
6.04
4.13
13.82
5.84
16.33
5.91
12.17
1.51
5.31
4.17
9.53
.13
.00
.07
.00
.32
.09
.08
.01
7.72
19.57
4.03
14.38
1.38
2.61
3.23
11.13
5.09
9.30
3.16
7.25
1.29
2.49
2.65
5.58
.07
.00
.16
.00
.31
.21
.10
.00
Attacks
All Actions
Conciliatory
Repressive
Conciliatory-Discriminate
Conciliatory-Indiscriminate
Repressive-Discriminate
Repressive-Indiscriminate
Oslo Lull (n = 76)
3.07
25.42
10.16
12.92
1.63
8.46
3.01
9.91
3.92
11.44
6.57
7.62
1.73
5.79
2.39
6.13
Second Intifada (n = 52)
.26
.00
.03
.00
.33
.03
.12
.01
7.79
42.00
8.12
29.89
1.38
6.73
6.85
23.04
7.98
19.76
5.28
14.21
1.42
4.88
6.11
11.17
.00
.00
.00
.00
.31
.02
.00
.00
Note: We generated all statistics from the data used to estimate the models. This means the first four
months of each series (and in 1994) were excluded due to the lagged dependent variable, and all
months from 1993 were excluded.
four months of each series (and in 1994), and
omitted all 1993 months. Turning first to the
dependent variable, we see that over the
entire period, there were, on average, almost
six attacks per month with only 13 percent of
months free of terrorist attacks. When we turn
to the three tactical regimes, we see, as
expected, that terror attacks were higher in
the First and Second Intifada compared to the
Oslo Lull (7.72 and 7.79 versus 3.07, respectively). Similarly, more than a quarter of the
months during the Oslo Lull saw no terror
attacks, whereas every month during the
Second Intifada had at least one attack and
almost every month in the First Intifada had
an attack.
Turning to the statistics describing Israel’s
actions, we see that over the entire period,
Israel initiated an average of nearly 28 actions
a month toward Palestinians. By scanning the
averages for actions partitioned by type, we
see Israel’s actions were most often repressive
and indiscriminate; averaging nearly 14 indiscriminate acts each month. In fact, according
to the data, in all but one month there was at
least one repressive-indiscriminate action
(shown by P(0) = .01). The table also shows
there were more than twice as many repressive acts (scale items 5, 6, and 7) as conciliatory acts (scale items 1, 2, and 3) each month,
and both actions were more often indiscriminate than discriminate. Conciliatory-discriminate acts were rare, averaging 1.47 each
month. More revealing is that in 32 percent of
months, Israel offered no discriminate conciliatory actions.
Although these patterns generally hold over
all three tactical regimes, there are important
differences worth noting. First, Israel’s average
number of total actions increased over time. It
was smallest during the First Intifada (19.57); it
rose during the Oslo Lull (25.42); and it reached
a peak during the Second Intifada (42.00). Israel
most frequently relied on conciliatory actions
612
American Sociological Review 77(4)
Figure 1. Quarterly Repressive and Conciliatory Actions by Israel and Palestinian Terrorist
Attacks
during the Oslo Lull (10.16) and most frequently relied on repressive actions during the
Second Intifada (29.89). Finally, almost every
month saw a wide range of types of actions by
Israel—excluding conciliatory-discriminate, of
course.
Because we are interested in the temporal
relationship between government actions and
terrorist attacks, we now map the quarterly
counts of repressive and conciliatory actions
onto the quarterly count of Palestinian terrorist attacks directed toward Israelis over time.14
This comparison is especially important
because both measures come from different
sources that were collected independently of
one another. Because we expect both government actions and terrorist attacks to vary with
the intensity of the Israeli–Palestinian conflict, we would also expect these measures to
track one another. Figure 1 presents a bar
chart of Israeli actions with a line depicting
Palestinian attacks mapped over it.15 Note
that actions are scaled by the left axis and
attacks are scaled by the right axis. Repres-
sive actions are marked with a light color and
conciliatory actions are shown with a solid
black bar. The three tactical regimes are separated by vertical dashed lines. Figure 1 shows
that both repressive and conciliatory actions
appear to track terrorist attacks rather closely
(r = .49 and r = .24, respectively). The frequency of terrorist attacks and the number of
conciliatory actions rose during the First Intifada, and repressive government actions show
no distinct pattern. Having said that, all three
series peaked around the time of the Oslo
Agreement and then declined until the beginning of the Second Intifada. During the Second Intifada, all three trends rose dramatically
and then declined at different rates.16
We now turn to results for the NBR and
GAM models that used data for all months
from June 1987 through December 2004.
Table 5 presents coefficients and standard
errors from the NBR models. Although we
tested all nonlinear relationships, this table
includes only squared terms if the tests concluded nonlinearity. Table 5 also includes
Dugan and Chenoweth
613
Table 5. Negative Binomial Coefficients and (SE), June 1987 through December 2004, n = 191
Model 1
Government Actions
All Actions
Model 2
.005
(.004)
Conciliatory
.048
(.031)
–.003*
(.001)
.009
(.006)
Conciliatory2
Repressive
Conciliatory-Discriminate
Conciliatory-Indiscriminate
(Conciliatory-Indiscriminate)2
Repressive-Discriminate
Repressive-Indiscriminate
Tactical Regime
First Intifada
Second Intifada
Controls
GTD2
First Lagged Attacks
Second Lagged Attacks
Third Lagged Attacks
Fourth Lagged Attacks
Model 3
.732**
(.156)
1.263**
(.264)
.626**
(.185)
1.120**
(.277)
–1.023**
(.255)
.023*
(.011)
–.001
(.010)
.035**
(.011)
.018
(.011)
–1.032**
(.252)
.025*
(.011)
.004
(.010)
.035**
(.011)
.020
(.011)
–.006
(.041)
.051
(.036)
–.003*
(.002)
.016
(.015)
.005
(.008)
.660**
(.191)
1.153**
(.278)
–1.028**
(.253)
.025*
(.011)
.002
(.010)
.034**
(.011)
.020
(.011)
*p ≤ .05; **p ≤ .01 (two-tailed tests).
results for the tactical regimes and control
variables. These findings confirm what we
expected: attacks were highest during the
Second Intifada—as evidenced by the large
and significant coefficient estimates in all
three models corresponding to the Second
Intifada—and second highest during the First
Intifada (compared to the Oslo Lull). Further-
more, terror attacks during the retrospective
data collection period (GTD2) were lower
than when data were collected prospectively.
Finally, coefficients for the lagged attacks
show that the first and third lagged attacks
were most important.17
Turning now to the hypotheses, Model 1 in
Table 5 shows the parametric estimate of the
614
American Sociological Review 77(4)
1.61374
–.360915
1
Lagged all actions
121
Figure 2. Partial Predictions of All Actions from the Past Month on Terrorist Attacks in the
Current Month
Note: Smoothing component of lagged actions has three degrees of freedom.
relationship between all government actions
and Palestinian terrorist attacks. Accordingly,
the value of the coefficient is positive but statistically null ( p = .26). Figure 2 presents partial
predictions (with 95 percent confidence bands)
of all government attacks for the past month on
terrorist attacks during the current month. We
include a horizontal line to mark zero (or no
relationship). Also, because the x-axis is the
number of actions in the previous month, any
nonlinear relationship suggests that the effect of
actions depends on the quantity of actions by the
Israeli government in the previous month. This
graph suggests that the number of Israeli actions
in the past month is unrelated to the number of
Palestinian terrorist attacks targeting Israelis.
The increase at the end of this graph is negligible because it is driven entirely by one month
that had 121 actions; all other months had fewer
than 90 actions. We conclude, therefore, that
Hypothesis 1 is unsupported.18
Turning now to findings related to our
second and third hypotheses, the NBR coefficient estimates presented in Table 5 under
Model 2 suggest that when Israel initiated
eight or fewer conciliatory actions there was
more terrorism the following month (the main
effect is positive yet less than marginal,
p = .12);19 however, when Israel initiated
more than eight conciliatory actions, terror
attacks appeared to drop (the quadratic term
is negative, p = .024). Conversely, the NBR
suggests a positive relationship between
repressive actions and terror attacks the following month, although the significance is
less than marginal ( p = .15).
Figures 3a and 3b present partial predictions of conciliatory and repressive actions
from the past month on terrorist attacks in the
current month, respectively. Both figures
mimic the NBR findings. Figure 3a shows
that with a low number of conciliatory actions,
attacks appeared to increase; however, as
Israel initiated more conciliatory actions, the
expected number of attacks in the next month
dropped—supporting the prediction of
Hypothesis 2. In fact, Israel initiated more
than eight conciliatory actions in 38 percent
of months, suggesting that the drop in Figure
3a is not driven by outliers. As we examine
the repressive actions in Figure 3b, a small
number of actions seem to have produced no
effect on attacks. However, as Israel initiated
more repressive actions, the expected number
of attacks rose. We interpret this finding with
caution because in most months (87 percent),
Dugan and Chenoweth
615
a. Conciliatory Actions
b. Repressive Actions
1.57031
.142908
–.171465
–1.04907
0
Lagged Conciliatory Acts
27
1
Lagged Repressive Acts
80
Figure 3. Partial Predictions of Conciliatory and Repressive Actions from the Past Month on
Terrorist Attacks in the Current Month
Note: Smoothing component of lagged actions has three degrees of freedom.
Israel initiated 30 or fewer repressive actions,
suggesting that the increase at the end of the
graph is driven by only 13 percent of the
months. At best, Hypothesis 3 is unsupported,
and at worst it is opposed, suggesting some
support for Hypothesis 4 (backlash).
We now turn to results for Model 3 in Table
5, which evaluates effects of discriminate and
indiscriminate actions. We expect a positive and
significant coefficient for repressive-indiscriminate actions (Hypothesis 4) and a negative and
significant coefficient for conciliatory-indiscriminate actions (Hypothesis 5). Results show
some support for Hypothesis 5, but no support
for Hypothesis 4. Like results for conciliatory
actions in general, conciliatory-indiscriminate
actions seem to affect terrorism only after
months in which Israel initiated relatively large
numbers (more than 8.5) of such actions.20 The
GAM partial predictors for all four variables
presented in Figure 4 conform to the findings
from Table 5. The drop below zero in Figure 4b
is driven by more than a quarter of the months,
suggesting it is sound.21 Figure 4c seems to suggest some backlash from repressive-discriminate acts; however, that increase appears to be
driven by relatively few months, as suggested
by the wide confidence bound.
To investigate whether relationships differ
across the three tactical regimes, we re-estimated Models 1, 2 and 3 for the First Intifada,
the Oslo Lull, and the Second Intifada months
and present the results in Tables 6a, 6b, and
6c, respectively. These tables include the
original findings from all months, for comparison. We included controls in the estimation, but we omit them here for parsimony.
Due to space constraints, partial predictions
from the GAM models are excluded, but they
are available in the online supplement.
Table 6a presents NBR coefficients for the
effect of all actions on Palestinian terror
attacks. We see that the relationship is null,
regardless of the period. Yet coefficients are
positive during the First and Second Intifada
and negative during the Oslo Lull, suggesting
that different dynamics were at play during
different tactical regimes. Regardless, it is
safe to conclude that these data do not support
Hypothesis 1, but a closer look at each of the
tactical regimes is in order.
Table 6b presents coefficient estimates for
Model 2, testing the relationship between
conciliatory and repressive actions separately
on terror attacks across each of the three
regimes. Recall that Hypotheses 2 and 3 predicted negative relationships between all
coefficients. Table 6b shows that only the
Second Intifada provides clear support for
Hypothesis 2. Here the relationship between
conciliatory actions and terror attacks is
unambiguously negative. Interestingly, this
finding is contrary to much conventional wisdom, in that the period when suicide missions
616
American Sociological Review 77(4)
a. Conciliatory-Discriminate
.376635
b. Conciliatory-Indiscriminate
.165583
–1.48244
–.691987
0
8
Lagged Conciliatory Discriminate
0
26
Lagged Conciliatory Indiscriminate
c. Repressive-Discriminate
d. Repressive-Indiscriminate
.6765
1.21061
–.212605
–.356292
0
32
Lagged Repressive Discriminate
0
48
Lagged Repressive Indiscriminate
Figure 4. Partial Predictions of the Past Month’s Actions—Conciliatory or Repressive and
Discriminate or Indiscriminate—on Terrorist Attacks in the Current Month
Note: Smoothing component of lagged actions has three degrees of freedom.
Table 6a. Negative Binomial Coefficients and (SE) for Government Actions in Model 1 for
Each Tactical Regime
All Actions
All Months
(n = 191)
First Intifada
(n = 61)
Oslo Lull
(n = 76)
Second Intifada
(n = 52)
.005
(.004)
.015
(.011)
–.020
(.012)
.007
(.005)
Note: Control variables were included in the estimation but excluded from this table.
*p ≤ .05; **p ≤ .01 (two-tailed tests).
dominated the terrorist environment was also
the period when conciliatory tactics had the
most powerful effect on reducing Palestinian
terrorism.
In contrast, during the First Intifada and
Oslo Lull, small numbers of Israeli conciliatory actions led to increases in Palestinian
terror attacks, but the negative coefficient of
the squared term shows that larger numbers of
conciliatory actions reduced terrorist attacks.
The GAM partial predictions, found in the
online supplement, show this effect was more
dramatic during the Oslo Lull. In summary,
Hypothesis 2 is directly supported only during the Second Intifada and receives only
qualified support during the other two
regimes. Conciliatory actions seem to have
reduced terrorist attacks only when Israel
initiated larger numbers of conciliatory
actions during the previous month.
Hypothesis 3 also finds no support in
Table 6b. Repression did not decrease Palestinian terrorism during any of the regimes. In
fact, the positive and significant estimate during the Second Intifada suggests that during
that period, Israel experienced backlash when
Dugan and Chenoweth
617
Table 6b. Negative Binomial Coefficients and (SE) for Government Actions in Model 2 for
Each Tactical Regime
Conciliatory
Conciliatory2
Repressive
All Months
(n = 191)
First Intifada
(n = 61)
Oslo Lull
(n = 76)
Second Intifada
(n = 52)
.048
(.031)
–.003*
(.001)
.009
(.006)
.280**
(.100)
–.019*
(.008)
–.002
(.014)
.173**
(.064)
–.007**
(.002)
–.011
(.015)
–.054*
(.023)
.021**
(.008)
Note: Control variables were included in the estimation but excluded from this table.
*p ≤ .05; **p ≤ .01 (two-tailed tests).
Table 6c. Negative Binomial Coefficients and (SE) for Government Actions in Model 3 for
Each Tactical Regime
Conciliatory-Discriminate
All Months
(n = 191)
First Intifada
(n = 61)
Oslo Lull
(n = 76)
Second Intifada (n = 52)
–.006
(.041)
.476*
(.217)
–.107*
(.051)
–.063
(.045)
–.041
(.077)
.051
(.036)
–.003*
(.002)
.030
(.042)
.172**
(.059)
–.009**
(.002)
–.055*
(.024)
.016
(.015)
.033
(.037)
.490**
(.154)
–.065**
(.017)
.021
(.017)
.005
(.008)
–.011
(.019)
.009
(.013)
.020*
(.010)
(Conciliatory-Discriminate)2
Conciliatory-Indiscriminate
(Conciliatory-Indiscriminate)2
Repressive-Discriminate
(Repressive-Discriminate)2
Repressive-Indiscriminate
Note: Control variables were included in the estimation but excluded from this table.
*p ≤ .05; **p ≤ .01 (two-tailed tests).
they initiated repression, partially supporting
Hypothesis 4.
To look for further evidence for Hypotheses 4 and 5, we turn to Table 6c, which lists
estimates for conciliatory and repressive
actions partitioned by whether they were discriminate or indiscriminate. Again, these
hypotheses are directly supported only in findings from the Second Intifada. During that
regime, conciliatory-indiscriminate actions
were associated with fewer terror attacks, and
repressive-indiscriminate actions were associated with more. Findings related to conciliatory acts during the First Intifada and the Oslo
Lull provide insight into results from Table 6b.
During the First Intifada, conciliatory-discriminate actions, where Israel gave concessions to terrorists rather than to the Palestinian
population, seem to have led to more terror.
Conciliatory-indiscriminate actions did not.
This means that during that regime, there was
often more terror following the months when
Israel offered concessions to terrorists. However, during the Oslo Lull regime, terror was
more frequent after Israel offered a few concessions to Palestinians in general, but the
effect reversed as the number of conciliatory
actions accumulated (see GAM results in the
618
online supplement for a graphical depiction of
this relationship). During that regime, we also
find evidence that attacks were more frequent
after months when Israel targeted repressive
actions toward terrorists.
These differences in findings across regimes
demonstrate some support for the notion that
effects of counterterrorism tactics may shift during different time periods, but not in the directions commonly expected. The Second Intifada,
often thought to be among the most extreme
periods of Palestinian violence, is the period
when conciliatory actions had the most direct
effect on reducing terrorist attacks. These findings suggest that instead of demonstrating irrational behaviors, groups like Hamas and PIJ
may be far more sensitive to opinions and
demands of the Palestinian constituency than is
often suggested—perhaps even more so than
secular Palestinian groups. This implication
echoes previous findings that emphasize the
hypersensitivity of religious organizations to
public opinion (Iannaccone and Berman 2006).
Moreover, our findings directly contest the
claim that repression reduces terrorist attacks
by raising the cost of terrorist activity—a
claim that receives no support in any of the
tactical regimes examined. Instead, we find
that during the First Intifada and the Oslo
Lull, reductions in terrorist attacks followed
months with relatively high numbers of conciliatory actions, although small numbers of
conciliatory actions were associated with a
modest increase in terrorist activity. Perhaps
during these periods, adopting only a handful
of conciliatory actions made Palestinians
question Israel’s sincerity, thereby making the
Palestinian public less responsive to potential
rewards of nonterror and emboldening terrorist groups to push for more conciliation.
Importantly, however, in months where conciliatory actions were more forthcoming and
frequent, the credible benefits of nonterrorism were clearer. During the Second Intifada,
effects of conciliatory actions on reducing
terrorism were more immediate, indicating,
perhaps, that during this particularly violent
period, rewards for nonterrorism were
accepted more swiftly.
American Sociological Review 77(4)
Conclusions
In this study, we found that governments can
often influence the number of terrorist attacks
perpetrated against their people. Our argument expands beyond traditional strategies of
deterrence by incorporating actions that raise
the expected utility of refraining from terrorist behavior. This strategy paid off, as we
found that this often-overlooked dimension
seemed to significantly reduce terrorist
attacks. Had we only measured effects of traditional deterrence, the analysis would have
appeared inconclusive at best, and the policy
implications would have been misleading: we
conclude that repressive actions by the Israeli
government are unlikely to deter Palestinian
terrorism and may lead to a backlash of terrorist violence. This backlash effect is especially prominent if repression is directed
toward Palestinians in general.
Considering that the utility of terrorist violence is much greater than the self-interest that
typically motivates common criminals, this
makes sense. Without additional conciliation,
the only value offered to terrorists and their
constituencies for disengaging from terrorism is
an absence of punishment—which is really just
the status quo. Had the status quo been sufficient to avert terrorism, no terrorism would
occur in the first place. Furthermore, terrorist
organizations are invested in ensuring that the
status quo remains unsatisfying to their constituencies (Malka 2007; Yaalon 2007). Thus, one
important contribution is demonstrating the
value of offering concessions to Palestinian
people that reward alternatives to violence.
Constituent populations need evidence that
opposes terrorist propaganda rather than evidence that reinforces it.
Results also suggest that conciliatory
actions must be sustained if they are to effectively reduce terrorist violence. A few conciliatory efforts are unlikely to show an effect;
and in fact, they could lead to increased violence, as we saw in the First Intifada and the
Oslo Lull. However, an ongoing and consistent campaign of conciliation can lead to a
drop in terrorism as early as the following
Dugan and Chenoweth
month. This is good news, but Israeli repression can easily dismantle such progress, as
the backlash can be swift—especially if the
repression affects innocent Palestinians.
Moreover, according to the results, the
scope of concessions matters. Indiscriminate
conciliatory actions—such as making gestures toward peace talks, announcing plans to
withdraw troops, and criticizing abuses
against Palestinians—may decrease subsequent terror attacks because they reward
nonterrorist behavior. On the other hand,
actions that single out particular terrorist
actors for conciliation (e.g., releasing prisoners) benefit terrorism rather than nonterrorism—and therefore, unsurprisingly, may not
reduce terrorism. Indeed, whereas indiscriminate conciliatory actions reduced terrorism
during two of the three periods (as conciliatory actions accumulated and appeared more
credible), discriminate conciliatory actions
reduced terrorism only during the First Intifada. This indicates that discriminate conciliatory actions typically yield fewer benefits in
counterterrorism than do more indiscriminate
actions that reward nonterrorist behavior
among the constituent population.
Combined, the full set of findings reinforces Braithwaite’s (2005) speculation that
terrorist organizations may even benefit from
repressive actions, and that they likely strategically elicit repressive responses that will
sabotage any goodwill that might be developing between Israel and the Palestinians. If the
Palestinian people begin to trust that Israel is
sincere about a mutually sustainable resolution to the conflict, terrorist organizations will
lose their base of support. Paradoxically, Palestinian terrorists probably rely on Israel’s
hawkish policies to preserve their longevity.
This article is the first to empirically demonstrate the important role that conciliatory
actions can play in reducing terrorist violence.
The importance of providing lawful alternatives to violence is mirrored in the criminological literature. Indeed, many programs that
research shows positively affect the lives
of those most at risk require consistent and
long-term exposure to healthier alternatives
619
(Olds et al. 1986; Rich and Jacoby 1999;
Schweinhart 2005). Similarly, nurturing the
relationship between a government and a terrorist organization’s constituency also requires
consistency.
Having said this, we do not recommend
that governments adopt purely conciliatory
policies. It is likely still important to punish
individuals who break the law, even if it produces no obvious deterrence benefits. In fact,
our analysis cannot speak to what would happen if Israel practiced only conciliatory
behavior, because every month had at least
one repressive action by Israel. Instead, our
hope is that this research provides alternatives
to solely focusing policy efforts on reducing
the expected utility of bad behavior by also
considering the value of raising the expected
utility of good behavior.
Authors’ Note
Equal authorship is implied.
Funding
This material is based on work supported by the Science
and Technology directorate of the U.S. Department of
Homeland Security under Grant Award Number 2008-ST061-ST0004, made to the National Consortium for the
Study of Terrorism and Responses to Terrorism (START,
http://www.start.umd.edu). The views and conclusions
contained in this document are those of the authors and
should not be interpreted as necessarily representing the
official policies, either expressed or implied, of the U.S.
Department of Homeland Security or START.
Acknowledgments
We gratefully acknowledge Phil Schrodt, Baris Kesgin, and
Matthias Heilke for helping us learn and use TABARI; and
Richard Berk for his methodological advice. We also thank
our research assistants, Jeremy Berkowitz, Miranda Berry,
Michael Distler, Robert Gambo, Max Livingston, Elizabeth
McClellan, Nicholas Miller, Valentina Postolache, Nicholas
Quah, Joanna Seirup, Max Slater, Elsie Smith, Rachel
Tecott, Elizabeth Weisman, Gregory Wong, and Nicholas
Yulinsky, who assisted with data collection, coding, and literature review.
Notes
1.This notation was partially borrowed from Piliavin
and colleagues (1986).
620
2.An important piece of scholarship by Sharvit and colleagues (2012) estimates effects of Israel’s coercive
and conciliatory policies on Palestinian terrorist violence from 2000 through 2006.
3.Like backlash, it is possible that conciliatory acts
could lead to increased terrorism if they lead terrorists
to perceive the state as weak, thereby emboldening
terrorists to use still more violence (Iyengar and
Monten 2008). Some scholars also argue that conciliatory tactics may create incentives for extremist
elements to sabotage efforts toward peace, depending
on the perceived strength of the negotiating partner
(Kydd and Walter 2002).
4.Some useful sources on the Israeli–Palestinian conflict include Bloom (2004), Gelvin (2005), Hafez
(2006), Jamal (2005), Pearlman (2008/2009), and
Tessler (1995).
5.Although some scholars argue that the Second Intifada persisted until 2007 (Brym and Andersen 2011),
we limit our study to 2004 because of data
availability.
6.According to some arguments, conciliation may
make the opposing government look weaker, therefore emboldening terrorists (Iyengar and Monten
2008; Kydd and Walter 2002).
7.Access to the data, statistical commands, and supplemental analysis is available in an online supplement
(http://asr.sage pub.com/supplemental).
8.These analyses used GTD data that were downloaded
on August 25, 2010. Because the GTD is continuously being updated, newer versions of data could
produce slightly different results. Having said that,
we know of no systematic changes to Israeli or Palestinian related terrorist attacks for the years in the
current analysis.
9.Before the earlier (1970 to 1997) GTD data were synthesized with the later data, the GTD data since 1997
were called GTD2. Since both collections have now
been synthesized, the data are called GTD as a whole
(Dugan 2012).
10.In our case, we used the CAMEO coding scheme.
11.Schrodt (2006) estimates that TABARI codes 33 million times faster than the average human coder.
12.Note that the reference category is Oslo Lull and the
five months prior to the First Intifada. Furthermore,
because we lagged the dependent variable by four
months, only one month prior to the First Intifada is
included in the estimation. That one month would
make an inadequate reference period, and there are no
compelling theoretical reasons to distinguish it from
the Oslo Lull.
13.We use the population in thousands for Israel in a
given year as the exposure measure for both the GAM
and negative binomial models.
14.A graphical representation of monthly counts is too
cluttered for the reader to easily interpret.
15.Terrorist attacks are missing in the months during
1993, the period for which the GTD is missing data.
American Sociological Review 77(4)
16.We have considered the possibility that the increase in
Israeli actions over time might be driven by an
increase in reporting rather than an increase in actual
events. Although we cannot entirely resolve this
problem here, our strategy was to select the most
impartial and extensive coverage available (Reuters)
and to carefully analyze each observation for intercoder reliability. Furthermore, we examined the
actions very closely to make sure that each is distinct
from the others, ensuring that each action is counted
only once in the GATE Database.
17.Adding additional lags provided no additional benefit; all statistical tests were null.
18.Granger tests confirm the findings in the tables. When
government actions are statistically significant,
Granger tests favor the more flexible model. When
government actions are statistically null, Granger
tests favor the model that excludes government
actions.
19.We estimated eight as the maximum number of
attacks using this equation: –.048/(2 × –.003).
20.This finding is unsurprising because the relatively
few discriminate-conciliatory acts (e.g., release of
terrorist prisoners) suggest that results for Model 2
were driven by indiscriminate acts.
21.Twenty-eight percent of months had more than eight
conciliatory-indiscriminate actions. We chose eight
actions because the maximum number of attacks followed 8.5 conciliatory-indiscriminate actions [–.51/
(2 × = .003)].
References
Andenaes, Johannes. 1971. “The Moral or Educative
Influence of Criminal Law.” Journal of Social Issues
27:17–31.
Araj, Bader. 2008. “Harsh State Repression as a Cause of
Suicide Bombing: The Case of the Palestinian-Israeli
Conflict.” Studies in Conflict and Terrorism 31:284–303.
Beccaria, Cesare. [1764] 1983. On Crimes and Punishment. Boston: Branden Books.
Becker, Gary S. 1968. “Crime and Punishment: An Economic Approach.” Journal of Political Economy
76:169–217.
Becker, Howard S. 1963. Outsiders: Studies in the Sociology of Deviance. New York: The Free Press.
Beitler, Ruth. 2004. The Path to Mass Rebellion: A Tale
of Two Intifadas. New York: Lexington Books.
Benmelech, Efraim, Claude Berrebi, and Esteban Klor.
2010. “Counter-Suicide Terrorism: Evidence from Home
Demolitions.” Working Paper No. 16493, National
Bureau of Economic Research, Cambridge, MA.
Bentham, Jeremy. [1781] 1996. An Introduction to the
Principles of Morals and Legislation. Oxford: Oxford
University Press.
Bloom, Mia. 2004. “Outbidding, Market Share, and Palestinian Suicide Bombing.” Political Science Quarterly 119:61–88.
Dugan and Chenoweth
Braithwaite, John. 2005. “Pre-empting Terrorism.” Current Issues in Criminal Justice 17:96–114.
Brodie, Bernard. 1959. Strategy in the Missile Age.
Princeton, NJ: Princeton University Press.
Brophy-Baermann, Bryan and John A. C. Conybeare.
1994. “Retaliating against Terrorism: Rational
Expectations and the Optimality of Rules versus
Discretion.” American Journal of Political Science
38:196–210.
Brym, Robert J. and Robert Andersen. 2011. “Rational
Choice and the Political Bases of Changing Israeli
Counterinsurgency Strategy.” British Journal of Sociology 62:482–503.
Brym, Robert J. and Bader Araj. 2006. “Suicide Bombing
as Strategy and Interaction: The Case of the Second
Intifada.” Social Forces 84:1969–86.
Bueno de Mesquita, Ethan. 2005. “Conciliation, Concessions, and Patterns of Terrorist Violence.” International Organization 59:145–76.
Byman, Daniel. 2006. “Do Targeted Killings Work?”
Foreign Affairs (March/April):95–107.
Cauley, Jon and Eric Iksoon Im. 1988. “Intervention
Policy Analysis of Skyjackings and Other Terrorist
Incidents.” American Economic Review 78:27–31.
Chenoweth, Erica and Laura Dugan. 2011. “Exploring Counterterrorism in the Middle East and North
Africa: A New Data Set.” Presented at the annual
meeting of the American Political Science Association, September 2, Seattle, WA.
Clark, Robert P. 1990. Negotiating with ETA: Obstacles
to Peace in the Basque Country, 1975–1988. New
York: Routledge.
Clauset, Aaron, Lindsay Heger, Maxwell Young, and
Kristian Skrede Gleditsch. 2010. “The Strategic Calculus of Terrorism: Substitution and Competition in
the Israel-Palestine Conflict.” Cooperation and Conflict 45:6–33.
Cornell, Svante E. 2001. “The Land of Many Crossroads:
The Kurdish Question in Turkish Politics.” Orbis
45:31–46.
Cornish, Derek B. and Ronald V. Clarke. 1987. “Understanding Crime Displacement: An Application of
Rational Choice Theory.” Criminology 45:933–47.
Crenshaw, Martha. 2001. “Theories of Terrorism: Instrumental and Organizational Approaches.” Pp. 13–29
in Inside Terrorism Organizations, edited by D. C.
Rapoport. London: Frank Cass.
Cronin, Audrey Kurth. 2006. “How al-Qaida Ends.”
International Security 31:7–48.
Della Porta, Donatella. 1995. “Left-Wing Terrorism in
Italy.” Pp. 105–159 in Terrorism in Context, edited by
M. Crenshaw. State College, PA: Pennsylvania State
University Press.
Dugan, Laura. 2012. “The Making of the Global Terrorism Database and Its Applicability to Studying the
Lifecycles of Terrorist Organizations.” Pp. 175–98
in The Sage Handbook of Criminological Research
Methods, edited by D. Gadd, S. Karstedt, and S.
Messner. Los Angeles, CA: Sage.
621
Dugan, Laura, Julie Huang, Gary LaFree, and Clark
McCauley. 2008. “The Armenian Secret Army for the
Liberation of Armenia and the Justice Commandos of
the Armenian Genocide.” Dynamics of Asymmetric
Conflict 1:231–49.
Dugan, Laura, Gary LaFree, and Alex R. Piquero. 2005.
“Testing a Rational Choice Model of Airline Hijackings.” Criminology 43:1031–1066.
Enders, Walter and Todd Sandler. 1993. “The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis.” American Political
Science Review 87:829–44.
Farrington, David P. 1977. “The Effects of Public Labeling.” British Journal of Criminology 17:112–25.
Flanigan, Shawn Teresa. 2010. For the Love of God:
NGOs and Religious Identity in a Violent World. Sterling, VA: Kumarian Press.
Flanigan, Shawn Teresa and Mounah Abdel-Samad.
2009. “Hezbollah’s Social Jihad: Nonprofits as Resistance Organizations.” Middle East Policy 16:122–37.
Frey, Bruno. 2004. Dealing with Terrorism: Stick or Carrot? Northampton, MA: Edward Elgar.
Gelvin, James. 2005. The Israel-Palestine Conflict: One
Hundred Years of War. New York: Cambridge University Press.
Gibbs, Jack P. 1975. Crime, Punishment, and Deterrence.
New York: Elsevier.
Goldkamp John S. and E. Rely Vilcica. 2008. “Targeted
Enforcement and Adverse System Side Effects: The
Generation of Fugitives in Philadelphia.” Criminology 46:371–409.
Goldstein, Joshua S. 1992. “A Conflict-Cooperation
Scale for WEIS Event Data.” Journal of Conflict
Resolution 36:369–85.
Gottfredson, Denise C., Stephanie A. Gerstenbligh,
David A. Soule, Shannon C. Womer, and Shaoli Lu.
2004. “Do After School Programs Reduce Delinquency?” Prevention Science 5:253–66.
Greene, William H. 2008. Econometric Analysis, 6th ed.
Upper Saddle River, NJ: Pearson Prentice Hall.
Hafez, Mohammed. 2006. “Rationality, Culture, and
Structure in the Making of Suicide Bombers: A Preliminary Theoretical Synthesis and Illustrative Case
Study.” Studies in Conflict and Terrorism 29:165–85.
Hafez, Mohammed and Joseph Hatfield. 2006. “Do Targeted Assassinations Work? A Multivariate Analysis
of Israel’s Controversial Tactic during the Al-Aqsa
Uprising.” Studies in Conflict and Terrorism 29:359–
82.
Hamm, Mark S. 2004. “Apocalyptic Violence: The
Seduction of Terrorist Subcultures.” Theoretical
Criminology 8:323–39.
Hastie, T. J. and R. J. Tibshirani. 1990. Generalized Additive Models. New York: Chapman and Hall.
Iannaccone, Laurence R. and Eli Berman. 2006. “Religious Extremism: The Good, the Bad, and the Ugly.”
Public Choice 128:109–129.
Iyengar, Radha and Jonathan Monten. 2008. “Is there an
‘Emboldenment’ Effect? Evidence from the Insurgency
622
in Iraq.” Working Paper No. 13839, National Bureau
of Economic Research, Cambridge, MA.
Jaeger, David A. and M. Danielle Paserman. 2008. “The
Cycle of Violence? An Empirical Analysis of Fatalities in the Palestinian-Israeli Conflict.” American
Economic Review 98:1591–1604.
Jamal, Amal. 2005. The Palestinian National Movement:
Politics of Contention, 1967–2005. Bloomington:
Indiana University Press
Kadi, Leila S., ed. 1969. Basic Political Documents of
the Armed Palestinian Resistance Movement. Beirut:
Palestine Research Centre.
Kalyvas, Stathis. 2006. The Logic of Violence in Civil
War. New York: Cambridge University Press.
Khawaja, Marwan. 1993. “Repression and Popular Collective Action: Evidence from the West Bank.” Sociological Forum 8:47–71.
Khawaja, Marwan. 1994. “Resource Mobilization, Hardship, and Popular Collective Action in the West
Bank.” Social Forces 73:191–220.
King, Mary E. 2007. A Quiet Revolution: The First Palestinian Intifada and Nonviolent Resistance. New York:
Nation Books.
Kocher, Matthew Adam and Stathis Kalyvas. 2007. “How
Free is ‘Free Riding’ in Civil Wars? Violence, Insurgency, and the Collective Action Problem.” World
Politics 59:177–216.
Koopmans, Ruud. 1993. “The Dynamics of Protest
Waves: West Germany, 1965 to 1989.” American
Sociological Review 58:637–58.
Kruglanski, Arie W., Xiaoyan Chen, Mark Dechesne,
Shira Fishman, and Edward Orehek. 2009. “Fully
Committed: Suicide Bombers’ Motivation and the
Quest for Personal Significance.” Political Psychology 30:331–57.
Kruglanski, Arie W., Michele Gelfand, and Rohan
Gunaratna. 2010. “Detainee Deradicalization: A
Challenge for Psychological Science.” Observer
(http://www.psychologicalscience.org/observer/
getArticle.cfm?id=2607).
Kuperman, Ranan D. 2007. Cycles of Violence: The Evolution of the Israeli Decision Regime Governing the
Use of Limited Military Force. Lanham, MD: Lexington.
Kydd, Andrew and Barbara F. Walter. 2002. “Sabotaging
the Peace: The Politics of Extremist Violence.” International Organization 56:263–96.
LaFree, Gary and Gary Ackerman. 2009. “The Empirical Study of Terrorism: Social and Legal Research.”
Annual Review of Law and Social Science 5:347–74.
LaFree, Gary and Laura Dugan. 2004. “How Does Studying Terrorism Compare to Studying Crime?” Pp. 53–74
in Terrorism and Counter-Terrorism: Criminological
Perspectives, edited by M. DeFlem. New York: Elsevier.
LaFree, Gary and Laura Dugan. 2007. “Introducing the
Global Terrorism Database.” Terrorism and Political
Violence 19:181–204.
LaFree, Gary, Laura Dugan, and Raven Korte. 2009.
“The Impact of British Counterterrorist Strategies
American Sociological Review 77(4)
on Political Violence in Northern Ireland: Comparing Deterrence and Backlash Models.” Criminology
47:501–530.
Landes, William. 1978. “An Economic Study of U.S.
Aircraft Hijacking, 1961–1976.” Journal of Law and
Economics 21:1–31.
Lapan, Harvey E. and Todd Sandler. 1988. “To Bargain
or Not To Bargain: That Is the Question.” American
Economic Review 78:16–21.
Levitt, Steven. 1996. “The Effect of Prison Population
Size on Crime Rates: Evidence from Prison Overcrowding Litigation.” Quarterly Journal of Economics 111:319–52.
Levitt, Steven. 1997. “Using Electoral Cycles in Police
Hiring to Estimate the Effect of Police on Crime.”
American Economic Review 87:270–90.
Lichbach, Mark Irving. 1987. “Deterrence or Escalation?
The Puzzle of Aggregate Studies of Repression and
Dissent.” Journal of Conflict Resolution 31:266–97.
Lyall, Jason. 2009. “Does Indiscriminate Violence Incite
Insurgent Attacks? Evidence from Chechnya.” Journal of Conflict Resolution 53:331–62.
Lyall, Jason and Isaiah Wilson. 2009. “Rage against
the Machines: Explaining Outcomes in Counterinsurgency Wars.” International Organization
63:67–106.
Malka, Haim. 2007. “Hamas: Resistance and Transformation of Palestinian Society.” Pp. 98–126 in Understanding Islamic Charities, edited by J. B. Alterman
and K. Von Hippel. Washington, DC: Center for Strategic and International Studies.
Maoz, Zeev. 2007. “Evaluating Israel’s Strategy of LowIntensity Warfare, 1949–2006.” Security Studies
16:319–49.
Marshall, Rachelle. 2009. “Middle East Leaders Hold
Open the Door to Peace—Will the U.S. and Israel
Respond?” Washington Report on Middle East
Affairs, Special Report, (January-February):7–9.
Matsueda, Ross L., Derek A. Kreager, and David Huizinga. 2006. “Deterring Delinquents: A Rational
Choice Model of Theft and Violence.” American
Sociological Review 71:95–122.
Mees, Ludger. 2003. Nationalism, Violence, and Democracy: The Basque Clash of Identities. New York: Palgrave Macmillian Ltd.
Moore, William H. 1998. “Repression and Dissent: Substitution, Context and Timing.” American Journal of
Political Science 42:851–73.
Nagin, Daniel S. 1998. “Criminal Deterrence Research
at the Outset of the Twenty-first Century.” Crime and
Justice 23:1–42.
Nagin, Daniel S. and Raymond Paternoster. 1993.
“Enduring Individual Differences and Rational
Choice Theories of Crime.” Criminology 27:467–96.
Neumann, Peter. 2007. “Negotiating with Terrorists.”
Foreign Affairs 86:128–38.
Newman, Sanford A., James Allen Fox, Edward A.
Flynn, and William Christeson. 2000. America’s After
School Choice: The Prime Time for Juvenile Crime,
Dugan and Chenoweth
or Youth Enrichment and Achievement, a research
report. Washington, DC: Fight Crime Invest in Kids.
Olds, David L., Charles R. Henderson Jr., Robert Tatelbaum, and Robert Chamberlin. 1986. “Improving the
Delivery of Prenatal Care and Outcomes of Pregnancy: A Randomized Trial of Nurse Home Visitation.” Pediatrics 77:16–28.
Paternoster, Raymond. 1987. “The Deterrent Effect of
the Perceived Certainty and Severity of Punishment:
A Review of the Evidence and Issues.” Justice Quarterly 4:173–217.
Pearlman, Wendy. 2008/2009. “Spoiling from the Inside
Out: Internal Political Contestation and the Middle
East Peace Process.” International Security 33:79–109.
Peroff, Kathleen and Christopher Hewitt. 1980. “Rioting
in Northern Ireland: The Effects of Different Policies.” Journal of Conflict Resolution 24:593–612.
Piazza, James A. and James Igoe Walsh. 2009. “Transnational Terrorism and Human Rights.” International
Studies Quarterly 53:125–48.
Piliavin, Irving, Rosemary Gartner, Craig Thorton, and
Ross L. Matsueda. 1986. “Crime, Deterrence, and
Rational Choice.” American Sociological Review
51:101–119.
Plaw, Avery. 2008. Targeting Terrorists: A License to
Kill? London: Ashgate.
Rasler, Karen. 1996. “Concessions, Repression, and
Political Protest in the Iranian Revolution.” American
Sociological Review 61:132–52.
Rasler, Karen. 2000. “Shock, Expectancy Revision, and
De-escalation of Protracted Conflicts.” Journal of
Peace Research 37:699–720.
Rich, Thomas F. and Kristen Jacoby. 1999. National
Evaluation of Weed and Seed Hartford Case Study,
research report. Washington, DC: Office of Justice
Programs.
Rigby, Andrew. 1991. Living the Intifada. London: Zed.
Ross, Laurence H. 1982. Deterring the Drunk Driver:
Legal Policy and Social Control. Lexington, MA:
D.C. Health.
Schrodt, Philip A. 2001. “Automated Coding of International Event Data Using Sparse Parsing Techniques.”
Department of Political Science, University of Kansas, Lawrence, KS. Unpublished manuscript.
Schrodt, Philip A. 2006. “Twenty Years of the Kansas
Event Data System Project.” Department of Political Science, University of Kansas, Lawrence, KS.
Unpublished manuscript.
Schrodt, Philip A., Shannon G. Davis, and Judith L. Weddle. 1994. “Political Science: KEDS: A Program for
Machine Coding Events Data.” Social Science Computer Review 12:561–88.
Schrodt, Philip A. and Deborah J. Gerner. 1994. “Validity
Assessment of a Machine-Coded Event Data Set for
the Middle East, 1982–1992.” American Journal of
Political Science 38:825–54.
Schwartz, Richard D. and Jerome H. Skolnick. 1962.
“Two Studies of Legal Stigma.” Social Problems
10:133–42.
623
Schweinhart, Lawrence J. 2005. The High/Scope Perry
Preschool Study through Age 40. Ypsilanti, MI: High/
Scope Press.
Sharvit, Keren, Arie W. Kruglanski, Mo Wang, Xiaoyan
Chen, Lauren Minacapelli, Boaz Ganor, and Eitan
Azani. 2012. “The Effects of Israeli Coercive and
Conciliatory Policies on Palestinian Terrorist Activity: 2000–2006.” Department of Psychology, University of Haifa, Israel. Unpublished manuscript.
Shellman, Stephen M. 2008. “Coding Disaggregated
Intrastate Conflict: Machine Processing the Behavior
of Substate Actors over Time and Space.” Political
Analysis 16:464–77.
Shellman, Stephen M., Claire Hatfield, and Maggie J.
Mills. 2010. “Disaggregating Actors in Intranational
Conflict.” Journal of Peace Research 47:83–90.
Sherman, Lawrence W. 1990. “Police Crackdowns: Initial and Residual Deterrence.” Crime and Justice
12:1–48.
Sherman, Lawrence W. 1993. “Defiance, Deterrence,
and Irrelevance: A Theory of the Criminal Sanction.” Journal of Research in Crime and Delinquency
30:445–73.
Tessler, Mark. 1995. A History of the Israeli-Palestinian
Conflict. Bloomington: Indiana University Press.
Testas, Abdelaziz. 2004. “Determinants of Terrorism in
the Middle East.” Terrorism and Political Violence
16:253–73.
Tibbetts, Stephen G. and Chris L. Gibson. 2002. “Individual Propensities and Rational Decision-Making:
Recent Findings and Promising Approaches.” Pp.
3–14 in Rational Choice and Criminal Behavior
Recent Research and Future Challenges, edited by A.
R. Piquero and S. G. Tibbetts. New York: Routledge.
Tyler, Tom R. 2006. “Psychological Perspectives on
Legitimacy and Legitimation.” Annual Review of
Psychology 57:375–400.
White, Robert. 1989. “From Peaceful Protest to Guerrilla War: Micromobilization of the Provisional Irish
Republican Army.” American Journal of Sociology
94:1277–1302.
Xiang, Dong. 2001. “Fitting Generalized Additive Models with the GAM Procedure.” SUGI Proceedings.
Cary, NC: SAS Institute, Inc.
Yaalon, Moshe. 2007. Lessons from the Palestinian
“War” Against Israel. Washington, DC: The Washington Institute for Near East Policy.
Zussman, Asaf and Noam Zussman. 2006. “Assassinations: Evaluating the Effectiveness of an Israeli
Counterterrorism Policy Using Stock Market Data.”
Journal of Economic Perspectives 20:193–206.
Laura Dugan is an Associate Professor in the Department of Criminology and Criminal Justice at the
University of Maryland. She is a lead investigator at the
National Center for the Study of Terrorism and the
Response to Terrorism (START). Her research examines
the consequences of violence and the efficacy of violence
prevention/intervention policy and practice. She also
624
designs methodological strategies to overcome data limitations inherent in the social sciences. She has published
scholarly articles in Criminology, Journal of Quantitative
Criminology, Crime and Justice, Law and Society, Terrorism and Political Violence, and others.
Erica Chenoweth is an Assistant Professor at the Josef
Korbel School of International Studies at the University
of Denver, where she directs the Program on Terrorism
and Insurgency Research. She is a lead investigator at
American Sociological Review 77(4)
START and an Associate Senior Researcher at the
Peace Research Institute of Oslo (PRIO). A specialist in
political violence and its alternatives, she is the coauthor of Why Civil Resistance Works: The Strategic
Logic of Nonviolent Conflict and co-editor of Rethinking Violence: States and Non-State Actors in Conflict.
She has published scholarly articles in the Journal of
Politics, International Security, Political Research
Quarterly, and the Review of Policy Research, among
other venues.